CVE-2024-26975
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/05/2024
Last modified:
23/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powercap: intel_rapl: Fix a NULL pointer dereference<br />
<br />
A NULL pointer dereference is triggered when probing the MMIO RAPL<br />
driver on platforms with CPU ID not listed in intel_rapl_common CPU<br />
model list.<br />
<br />
This is because the intel_rapl_common module still probes on such<br />
platforms even if &#39;defaults_msr&#39; is not set after commit 1488ac990ac8<br />
("powercap: intel_rapl: Allow probing without CPUID match"). Thus the<br />
MMIO RAPL rp->priv->defaults is NULL when registering to RAPL framework.<br />
<br />
Fix the problem by adding sanity check to ensure rp->priv->rapl_defaults<br />
is always valid.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (including) | 6.6.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78
- https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e
- https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6
- https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1
- https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78
- https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e
- https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6
- https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1



